Please wait a minute...

Current Issue

    20 May 2020, Volume 36 Issue 5
    Point of View
    Application of blockchain in telecom operators
    Yunyong ZHANG,Gang CHENG,Gang AN,Xuehong YANG,Guixiang ZOU
    2020, 36(5):  1-7.  doi:10.11959/j.issn.1000-0801.2020151
    Asbtract ( 547 )   HTML ( 74)   PDF (964KB) ( 616 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Blockchain is another disruptive technological revolution after the IoT,cloud computing and big data.Blockchain technology and typical application cases were firstly introduced,and then the role of blockchain technology and blockchain in operators were analyzed.Secondly,combined with the characteristics of the blockchain,the application of blockchain in multiple operators were focused on,such as infrastructure,international roaming settlement,digital points issuance and trading,data storage,cross-border payment,identity verification,and credit reporting.Finally,the challenges faced by operators in the comprehensive application of blockchain were introduced.

    Topic: Intelligent and Highly Confrontational Development of Network Security
    Reference architecture of the telecom network security protection system for cloud network convergence
    Jian ZHANG,Hongyu TANG,Wentao LIU,Mingxia BO
    2020, 36(5):  10-15.  doi:10.11959/j.issn.1000-0801.2020140
    Asbtract ( 250 )   HTML ( 19)   PDF (774KB) ( 739 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cloud network convergence has become a development trend in the field of cloud computing and a key step in the strategic transformation of telecom operators.Firstly,the development status of cloud network convergencewas expounded from the aspects of its connotation,typical application scenarios and the reconstruction of telecom network by cloud network convergence.Then,the security requirements of telecom network for cloud network convergencewere analyzed from three aspects.Based on the analysis of security requirements,the overall security protection architecture of telecom network for cloud network convergence was put forward,including the construction of basic security protection system and the software-defined security protection system,and the specific levels and contents of the basic security protection system and the software-defined security protection system were elaborated.Finally,the prospect of the future was prospected.

    A domain adaptive hybrid genetic algorithm and its verification in security service function chain orchestration
    Xiaohui YAO,Qing LI,Kunkun SUN
    2020, 36(5):  16-24.  doi:10.11959/j.issn.1000-0801.2020144
    Asbtract ( 197 )   HTML ( 20)   PDF (798KB) ( 465 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Faced with changeful network demands,users have increasingly higher requirements for traditional network.Features such as flexibility,scalability and ease of use have become essential elements of modern network.A domain adaptive hybrid genetic algorithm (DAHGA) was proposed,which could be applied to the security service chain arrangement of cloud data center tenants,to achieve automatic loading and activation of tenant cloud security services and policies,to meet tenant cloud security “customization on demand” requirements.And conducts experimental comparison research on the effective placement efficiency of each VNF on the cloud security service chain orchestration was carried out,which fully validated the proposed algorithm.Effectiveness provides a reference and reference for the realization of cloud business non-destructive security service chain orchestration technology.

    Research on fusion model based on deep learning for text content security enhancement
    Shaomin WANG,Zheng WANG,Hua REN
    2020, 36(5):  25-30.  doi:10.11959/j.issn.1000-0801.2020145
    Asbtract ( 363 )   HTML ( 30)   PDF (804KB) ( 737 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The rapid expansion of information content on the internet and the mobile internet has resulted in violations of laws and regulations and bad information,which affects the content security of the internet space.Traditional text content security recognition methods based on matching of sensitive words ignore context semantics,resulting in high false positive rate and low accuracy.Based on the analysis of traditional text content security recognition methods,a fusion recognition model using deep learning and a model fusion algorithm process were proposed.Text content security recognition system based on the fusion recognition model using deep learning and experimental verification was introducted deeply.Results show that the proposed model can effectively solve the problem of high false positive rate caused by the lack of semantic understanding of traditional recognition methods,and improve the accuracy of the bad information detection.

    Modeling of the mimic defense based on heterogeneous redundancy
    Junning QIN,Jiajia HAN,Sheng ZHOU,Chunming WU,Shuangxi CHEN,Ruoyan ZHAO,Jiangyu ZHANG
    2020, 36(5):  31-38.  doi:10.11959/j.issn.1000-0801.2020143
    Asbtract ( 245 )   HTML ( 16)   PDF (905KB) ( 293 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.

    Defense of hidden backdoor technology for Web
    Liyue CHEN,Xin SUN,Tiansheng CHENG,Chunming WU,Shuangxi CHEN
    2020, 36(5):  39-46.  doi:10.11959/j.issn.1000-0801.2020142
    Asbtract ( 195 )   HTML ( 15)   PDF (781KB) ( 326 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Rootkit is a set of persistent and undetectable attack technologies,which can hide their attack behavior and backdoor trace by modifying software or kernel in operating system and changing execution path of instruction.Firstly,the basic definition and evolution of Rootkit were introduced,then the operating principle,current mainstream technology and detection methods of Rootkit were discussed.Then,through comparative experiments on performance and security,the application of mimic defense system was described for Web based on dynamic,heterogeneous,redundant structure under Trojan Horse attack.Experiments show that mimic defense system can effectively defend against Trojan Horse in tests in the premise of low overhead.At last,the opportunities and challenges of the DHR system were summarized.

    Detection of malicious domain name based on a classifier combination
    Jiantao SHENG,Maofei CHEN,Dongxin LIU,Laifu WANG,Guoshui SHI,Huamin JIN
    2020, 36(5):  47-55.  doi:10.11959/j.issn.1000-0801.2020150
    Asbtract ( 246 )   HTML ( 14)   PDF (781KB) ( 497 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.

    Research and Development
    Modeling and simulation of the non-stationary fading channels under fast time-variant environment
    Boyu HUA,Qiuming ZHU,Xiaoxiang HE,Kai MAO
    2020, 36(5):  56-64.  doi:10.11959/j.issn.1000-0801.2020062
    Asbtract ( 162 )   HTML ( 12)   PDF (1795KB) ( 407 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For solving the problem of non-stationary features in rapid time-varying scenarios,such as high-speed railway,unmanned aerial vehicle and V2X communication,an improved simulation method for non-stationary fading channels was proposed.Introducing the integral items and random offset,this method can revive non-stationary channels under time-variant scattering scenarios and ensure a smooth transition between two adjacent channel states.Numerical simulations show that simulated statistical properties,such as,the probability density function,auto-correlation function,and Doppler power spectral density have good agreements with the theoretical ones.Thus,this method can be applied for wireless channel modeling and communication system evaluation of future high-speed mobile scenarios.

    Physical layer security performance of SWIPT system in the presence of randomly located eavesdroppers
    Hui QIAN,Guangqiu LI,Yifan DING
    2020, 36(5):  65-72.  doi:10.11959/j.issn.1000-0801.2020147
    Asbtract ( 161 )   HTML ( 9)   PDF (744KB) ( 382 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The locations of the eavesdroppers have serious impact on the physical layer security performance of simultaneous wireless information and power transfer (SWIPT) systems with transmit antenna selection (TAS) and power split (PS) strategy,which can be considered to be modeled as Poisson point process (PPP).The closed-form expressions for secrecy outage probability (SOP) of SWIPT system with TAS and PS strategy under non-colluding and colluding eavesdropping scenarios were derived by using probability generation function of PPP,respectively.Numerical and simulation results show that,the larger the number of transmit antennas,the smaller the distance between the transmitter and the information receiver,and the smaller the PS factor,the smaller SOP of SWIPT system under non-colluding and colluding eavesdropping scenarios.Colluding eavesdropping will further deteriorate the physical layer security performance of SWIPT systems.

    A differential feedback scheduling decision algorithm based on mimic defense
    Ming GAO,Jin LUO,Huiying ZHOU,Hai JIAO,Lili YING
    2020, 36(5):  73-82.  doi:10.11959/j.issn.1000-0801.2020146
    Asbtract ( 208 )   HTML ( 19)   PDF (1010KB) ( 268 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Facing the security problem of the service path, according to the service function chain deployment mimic defense architecture based on dynamic heterogeneous redundancy (DHR) model in the mimic defense theory, and combined with the actual needs of the service path deployment, a differential feedback scheduling decision algorithm based on mimic defense was proposed. Firstly, according to the heterogeneity of the executive set in the scheduling algorithm and the security defense coefficient, the scheduler suitable for the mimic defense scenario was selected from the executive pool, and then the decider was selected according to the reliability coefficient of the decision algorithm and the majority decision algorithm. The proposed algorithm, common scheduling algorithm and decision algo rithm were simulated and analyzed. Simulation results show that the proposed algorithm can effectively improve the system’s defense capabilities and ensure the security of the service path configuration.

    Compressed sensing subspace pursuit algorithm based on two stagewise weak selection
    Bowei WANG,Jin TAN
    2020, 36(5):  83-92.  doi:10.11959/j.issn.1000-0801.2020149
    Asbtract ( 199 )   HTML ( 6)   PDF (964KB) ( 236 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Compressed sensing is a new way of signal sampling and data compression.The subspace pursuit algorithm has higher efficiency and precision in the compressed sensing reconstruction algorithms,but it needs the sparsity of the signal as a priori information.And if the sparsity estimation is not accurate enough,it will reduce the algorithm reconstruction effect.Aiming at this problem,a two stagewise weak selection-based subspace pursuit (TSWSP) algorithm was proposed,which didn’t need to know the sparsity of the signal in advance.The first weak selection adaptively selected the initial atom candidate set,and the second weak selection adaptively culled the wrong atoms that may had been previously selected from the current atom support set,and finally it selected a plurality of related atoms from the current atom candidate set to join the atom support set by the backtracking method.Simulation analysis shows that the proposed algorithm can reconstruct one-dimensional random signals and two-dimensional image signals accurately with unknown sparsity,and it has high stability,compared with OMP,SWOMP,BAOMP,SAMP and SP algorithm,the mean-square erroris reduced by 60.5% to 99.1%,the peak signal-to-noise ratio is improved by 2.1% to 34.3%.

    Public opinion model based on super-influencer integrating network community and content
    Jianliang WEI,Hao JI,Tengyan TIAN,Shengli ZHOU
    2020, 36(5):  93-105.  doi:10.11959/j.issn.1000-0801.2020152
    Asbtract ( 213 )   HTML ( 7)   PDF (8484KB) ( 279 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Aiming at the abnormal deviation and distortion of online public opinion,a public opinion model based on super-influencer integrating network community and content was designed.Deffuant-Weisbuch (DW) model was adopted,and factors such as user relationship,node identity and information noise were incorporated into the model,and the generation of public opinion deviation was simulated through simulation experiments.The results indicate that super-influencer leads to irreversible deviation of network public opinion,controversial content causes opinion fluctuation and convergence,but not the final opinion as a whole.There are differences in the interference effect between strong and weak communities,and by increasing the internal strength and external influence of the community,it can conduct public opinion confrontation with super-influencer,thus reversing the direction of public opinion deviation.

    Comprehensive Review
    Research and prospect of intelligent internet of vehicles based on 5G technology
    Rongyue YANG,Pengzhou ZHANG,Qing SONG
    2020, 36(5):  106-114.  doi:10.11959/j.issn.1000-0801.2020058
    Asbtract ( 720 )   HTML ( 99)   PDF (971KB) ( 1625 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the rapid development of 5G communication technology,in the future,V2X will take 5G communication technology as the starting point,integrate 5G vehicle unit,5G base station,5G mobile terminal,5G cloud server and other advanced equipment,to provide comprehensive and high-quality services for multi-type users.Firstly,the key technologies of V2X and its evolution to 5G era were outlined.5G is deeply integrated with the internet of vehicles,which has the technical advantages of relatively low deployment cost and clear evolution route.Then,the application and research status of 5G emerging key technologies such as mobile edge computing (MEC) and network slicing in typical application scenarios of the Internet of vehicles was focused on.Finally,the problems of 5G internet of vehicles in communication interference,network security and privacy protection,communication interference were put forward,and the research direction was pointed out.

    Operation Technology
    Analysis on the application necessity of time-sensitive network technology in the field of industrial interconnection
    Jinyu ZHU,Shihui DUAN,Hengsheng ZHANG,Xuetao YU
    2020, 36(5):  115-124.  doi:10.11959/j.issn.1000-0801.2020148
    Asbtract ( 384 )   HTML ( 42)   PDF (1068KB) ( 884 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the coming of the era of industrial internet,the data flow in the industrial scene is increasing exponentially.Time-sensitive network has become one of the important evolution directions of industrial network.By analyzing the challenges and development trend of new industrial networks,the necessity of time-sensitive network as its evolution direction was deduced.The core characteristics and mechanism of time-sensitive network were described,and the technical advantages of time-sensitive network were clarified,through the summary of the key capabilities of time-sensitive network were summarized,and the feasibility of time-sensitive network technology becoming the core key technology of new industrial network of industrial internet was further proved.

    Study on 5G networking scheme
    Qing LI
    2020, 36(5):  125-137.  doi:10.11959/j.issn.1000-0801.2020008
    Asbtract ( 300 )   HTML ( 31)   PDF (1449KB) ( 962 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    5G network architecture,network characteristics and network deployment requirements of 5G typical services were mainly described.At the same time,5G core network,5G bearer network,5G access network end-to-end networking scheme suggestions were put forward,and 5G signaling network organization and routing mode in multiple scenarios were proposed,in order to provide reference for speeding up the commercial deployment of 5G network for telecom operators.

    Network security threat prevention and control system of electric power monitoring systems for wind farm
    Wei DING
    2020, 36(5):  138-144.  doi:10.11959/j.issn.1000-0801.2020018
    Asbtract ( 218 )   HTML ( 13)   PDF (886KB) ( 718 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The frequent occurrence of network security incidents on wind farms seriously threatens the safety of power plants and power grids.The network security risk of power monitoring system on wind farms was analyzed from five aspects,including structure security,system ontology,security management,security emergency and infrastructure physical security.In view of the existing security protection technology,a security threat prevention and control system was put forward to ensure the safe and stable operation of the power monitoring system of wind farms and power grid from four aspects of security protection,security monitoring,access control and security management.

    Research on artificial intelligence key technologies of mobile terminal
    Tao PANG,Haihua QIU,Biying PAN
    2020, 36(5):  145-151.  doi:10.11959/j.issn.1000-0801.2020045
    Asbtract ( 378 )   HTML ( 47)   PDF (655KB) ( 701 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    With the progress of software and hardware technology of mobile terminals,the machine learning ability of mobile terminals has been explored.Starting from the overall framework of mobile terminal artificial intelligence technology,the end-to-end artificial intelligence hardware acceleration technology was studied,mainstream on-device machine learning frameworks,neural network model compression and other software technologies were compared,the development trend of AI application was analyzed,and the current technological progress and future development trend of mobile terminal artificial intelligence were summarized.

    Design and implementation of intelligent maintenance system based on blockchain technology
    Yang QU,Beili QIAN,Chengyu ZHANG,Yue LONG,Jie JIA
    2020, 36(5):  152-158.  doi:10.11959/j.issn.1000-0801.2020053
    Asbtract ( 296 )   HTML ( 41)   PDF (812KB) ( 663 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In recent years,with the increasingly complex and large-scale evolution of IT systems,objectively higher requirements have been placed on IT operation and maintenance technology.From the perspective of blockchain Raft consensus algorithm technology,the application of blockchain technology in intelligent operation and maintenance system was elaborated.By comparing the blockchain technology with the traditional technology,a new architecture and some reconstruction difficulties to solve the existing problems were provided,to realize a smart operation and maintenance system based on the blockchain technology.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Posts and Telecom Press Co., Ltd.
Publisher: Beijing Xintong Media Co., Ltd.
Editor-in-Chief: Chen Shanzhi
Editorial Director: Li Caishan
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Postal Code: 100079
Tel: 010-53879277
        010-53879278
        010-53879279
E-mail: dxkx@ptpress.com.cn
Mailing Code: 2-397
ISSN 1000-0801
CN 11-2103/TN
Visited
Total visitors:
Visitors of today:
Now online: